Vulnerability Description
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envoyproxy | Envoy | <= 1.12.4 |
Related Weaknesses (CWE)
References
- https://github.com/envoyproxy/envoy/commits/masterPatchThird Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-8hf8-8gvw-ggvxThird Party Advisory
- https://github.com/envoyproxy/envoy/commits/masterPatchThird Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-8hf8-8gvw-ggvxThird Party Advisory
FAQ
What is CVE-2020-12604?
CVE-2020-12604 is a vulnerability with a CVSS score of 7.5 (HIGH). Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume ...
How severe is CVE-2020-12604?
CVE-2020-12604 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-12604?
Check the references section above for vendor advisories and patch information. Affected products include: Envoyproxy Envoy.